Sciweavers

1611 search results - page 180 / 323
» An Access Control Model for Video Database Systems
Sort
View
IDEAS
2003
IEEE
91views Database» more  IDEAS 2003»
15 years 3 months ago
Implementation Issues of a Deterministic Transformation System for Structured Document Query Optimization
As the popularity of XML keeps growing rapidly, XML compliant structured document management becomes an interesting and compelling research area. Query optimization for structured...
Dunren Che
SAC
2010
ACM
15 years 4 months ago
Adaptive internet services through performance and availability control
Cluster-based multi-tier systems provide a means for building scalable Internet services. Building adaptive Internet services that are able to apply appropriate system sizing and ...
Jean Arnaud, Sara Bouchenak
WICOMM
2011
14 years 5 months ago
The effects of shadow-fading on QoS-aware routing and admission control protocols designed for multi-hop MANETs
—Providing quality-of-service (QoS) assurances in a mobile ad hoc network (MANET) is difficult due to node mobility, contention for channel access, a lack of centralised coordin...
Lajos Hanzo, Rahim Tafazolli
EDOC
2005
IEEE
15 years 3 months ago
Bridging the Gap between Data Warehouses and Business Processes: A Business Intelligence Perspective for Event-Driven Process Ch
Data Warehouse (DWH) information is accessed by business processes, and sometimes may also initiate changes of the control flow of business process instances. Today, there are no ...
Veronika Stefanov, Beate List
NDSS
2009
IEEE
15 years 4 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha